亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? openssl.cnf

?? 可以實現搭建VPN服務器
?? CNF
字號:
# For use with easy-rsa version 2.0## OpenSSL example configuration file.# This is mostly being used for generation of certificate requests.## This definition stops the following lines choking if HOME isn't# defined.HOME			= .RANDFILE		= $ENV::HOME/.rndopenssl_conf		= openssl_init[ openssl_init ]# Extra OBJECT IDENTIFIER info:#oid_file		= $ENV::HOME/.oidoid_section		= new_oidsengines                 = engine_section# To use this configuration file with the "-extfile" option of the# "openssl x509" utility, name here the section containing the# X.509v3 extensions to use:# extensions		= # (Alternatively, use a configuration file that has only# X.509v3 extensions in its main [= default] section.)[ new_oids ]# We can add new OIDs in here for use by 'ca' and 'req'.# Add a simple OID like this:# testoid1=1.2.3.4# Or use config file substitution like this:# testoid2=${testoid1}.5.6####################################################################[ ca ]default_ca	= CA_default		# The default ca section####################################################################[ CA_default ]dir		= $ENV::KEY_DIR		# Where everything is keptcerts		= $dir			# Where the issued certs are keptcrl_dir		= $dir			# Where the issued crl are keptdatabase	= $dir/index.txt	# database index file.new_certs_dir	= $dir			# default place for new certs.certificate	= $dir/ca.crt	 	# The CA certificateserial		= $dir/serial 		# The current serial numbercrl		= $dir/crl.pem 		# The current CRLprivate_key	= $dir/ca.key	 	# The private keyRANDFILE	= $dir/.rand		# private random number filex509_extensions	= usr_cert		# The extentions to add to the cert# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs# so this is commented out by default to leave a V1 CRL.# crl_extensions	= crl_extdefault_days	= 3650			# how long to certify fordefault_crl_days= 30			# how long before next CRLdefault_md	= md5			# which md to use.preserve	= no			# keep passed DN ordering# A few difference way of specifying how similar the request should look# For type CA, the listed attributes must be the same, and the optional# and supplied fields are just that :-)policy		= policy_anything# For the CA policy[ policy_match ]countryName		= matchstateOrProvinceName	= matchorganizationName	= matchorganizationalUnitName	= optionalcommonName		= suppliedemailAddress		= optional# For the 'anything' policy# At this point in time, you must list all acceptable 'object'# types.[ policy_anything ]countryName		= optionalstateOrProvinceName	= optionallocalityName		= optionalorganizationName	= optionalorganizationalUnitName	= optionalcommonName		= suppliedemailAddress		= optional####################################################################[ req ]default_bits		= $ENV::KEY_SIZEdefault_keyfile 	= privkey.pemdistinguished_name	= req_distinguished_nameattributes		= req_attributesx509_extensions	= v3_ca	# The extentions to add to the self signed cert# Passwords for private keys if not present they will be prompted for# input_password = secret# output_password = secret# This sets a mask for permitted string types. There are several options. # default: PrintableString, T61String, BMPString.# pkix	 : PrintableString, BMPString.# utf8only: only UTF8Strings.# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).# MASK:XXXX a literal mask value.# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings# so use this option with caution!string_mask = nombstr# req_extensions = v3_req # The extensions to add to a certificate request[ req_distinguished_name ]countryName			= Country Name (2 letter code)countryName_default		= $ENV::KEY_COUNTRYcountryName_min			= 2countryName_max			= 2stateOrProvinceName		= State or Province Name (full name)stateOrProvinceName_default	= $ENV::KEY_PROVINCElocalityName			= Locality Name (eg, city)localityName_default		= $ENV::KEY_CITY0.organizationName		= Organization Name (eg, company)0.organizationName_default	= $ENV::KEY_ORG# we can do this but it is not needed normally :-)#1.organizationName		= Second Organization Name (eg, company)#1.organizationName_default	= World Wide Web Pty LtdorganizationalUnitName		= Organizational Unit Name (eg, section)#organizationalUnitName_default	=commonName			= Common Name (eg, your name or your server\'s hostname)commonName_max			= 64emailAddress			= Email AddressemailAddress_default		= $ENV::KEY_EMAILemailAddress_max		= 40# JY -- added for batch modeorganizationalUnitName_default = $ENV::KEY_OUcommonName_default = $ENV::KEY_CN# SET-ex3			= SET extension number 3[ req_attributes ]challengePassword		= A challenge passwordchallengePassword_min		= 4challengePassword_max		= 20unstructuredName		= An optional company name[ usr_cert ]# These extensions are added when 'ca' signs a request.# This goes against PKIX guidelines but some CAs do it and some software# requires this to avoid interpreting an end user certificate as a CA.basicConstraints=CA:FALSE# Here are some examples of the usage of nsCertType. If it is omitted# the certificate can be used for anything *except* object signing.# This is OK for an SSL server.# nsCertType			= server# For an object signing certificate this would be used.# nsCertType = objsign# For normal client use this is typical# nsCertType = client, email# and for everything including object signing:# nsCertType = client, email, objsign# This is typical in keyUsage for a client certificate.# keyUsage = nonRepudiation, digitalSignature, keyEncipherment# This will be displayed in Netscape's comment listbox.nsComment			= "Easy-RSA Generated Certificate"# PKIX recommendations harmless if included in all certificates.subjectKeyIdentifier=hashauthorityKeyIdentifier=keyid,issuer:alwaysextendedKeyUsage=clientAuthkeyUsage = digitalSignature# This stuff is for subjectAltName and issuerAltname.# Import the email address.# subjectAltName=email:copy# Copy subject details# issuerAltName=issuer:copy#nsCaRevocationUrl		= http://www.domain.dom/ca-crl.pem#nsBaseUrl#nsRevocationUrl#nsRenewalUrl#nsCaPolicyUrl#nsSslServerName[ server ]# JY ADDED -- Make a cert with nsCertType set to "server"basicConstraints=CA:FALSEnsCertType			= servernsComment			= "Easy-RSA Generated Server Certificate"subjectKeyIdentifier=hashauthorityKeyIdentifier=keyid,issuer:alwaysextendedKeyUsage=serverAuthkeyUsage = digitalSignature, keyEncipherment[ v3_req ]# Extensions to add to a certificate requestbasicConstraints = CA:FALSEkeyUsage = nonRepudiation, digitalSignature, keyEncipherment[ v3_ca ]# Extensions for a typical CA# PKIX recommendation.subjectKeyIdentifier=hashauthorityKeyIdentifier=keyid:always,issuer:always# This is what PKIX recommends but some broken software chokes on critical# extensions.#basicConstraints = critical,CA:true# So we do this instead.basicConstraints = CA:true# Key usage: this is typical for a CA certificate. However since it will# prevent it being used as an test self-signed certificate it is best# left out by default.# keyUsage = cRLSign, keyCertSign# Some might want this also# nsCertType = sslCA, emailCA# Include email address in subject alt name: another PKIX recommendation# subjectAltName=email:copy# Copy issuer details# issuerAltName=issuer:copy# DER hex encoding of an extension: beware experts only!# obj=DER:02:03# Where 'obj' is a standard or added object# You can even override a supported extension:# basicConstraints= critical, DER:30:03:01:01:FF[ crl_ext ]# CRL extensions.# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.# issuerAltName=issuer:copyauthorityKeyIdentifier=keyid:always,issuer:always[ engine_section ]## If you are using PKCS#11# Install engine_pkcs11 of opensc (www.opensc.org)# And uncomment the following# verify that dynamic_path points to the correct location##pkcs11 = pkcs11_section[ pkcs11_section ]engine_id = pkcs11dynamic_path = /usr/lib/engines/engine_pkcs11.soMODULE_PATH = $ENV::PKCS11_MODULE_PATHPIN = $ENV::PKCS11_PINinit = 0

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91精品国产一区二区三区| av影院午夜一区| 蜜臀av性久久久久蜜臀av麻豆| 欧美精品丝袜久久久中文字幕| 亚洲国产精品二十页| 成人精品一区二区三区四区 | 欧美一个色资源| 国产91精品露脸国语对白| 亚洲视频一二三| 日韩欧美国产电影| 91无套直看片红桃| 久久66热偷产精品| 亚洲第一成年网| 国产精品视频一二| 欧美日韩国产高清一区二区三区| 性久久久久久久久| 久久久午夜精品| 精品视频一区二区三区免费| 日韩福利视频网| 一区二区三区日韩精品| 亚洲国产精品99久久久久久久久| 99久久久免费精品国产一区二区| 亚洲成人av一区| 91精品国产综合久久福利| 不卡的av电影在线观看| 国产在线国偷精品免费看| 日本欧美加勒比视频| 亚洲一区欧美一区| 一区二区视频在线看| 亚洲猫色日本管| 亚洲精品国产无套在线观| 国产精品无码永久免费888| 久久精品亚洲国产奇米99| www成人在线观看| 欧美成人欧美edvon| 精品日韩欧美一区二区| 欧美一区二视频| 欧美乱熟臀69xxxxxx| 欧美日韩一区成人| 精品噜噜噜噜久久久久久久久试看| 欧美体内she精视频| 日韩欧美国产一二三区| 欧美一区二区在线免费观看| 欧美日韩美少妇| 91精品国产色综合久久不卡电影 | 国内国产精品久久| 国产乱码精品一区二区三| 一本大道久久a久久精二百| 日韩视频一区在线观看| 亚洲欧美综合另类在线卡通| ...av二区三区久久精品| 亚洲激情在线激情| 国产中文字幕一区| 91精品福利在线| 久久婷婷综合激情| 五月天激情综合网| 国产成人在线看| 欧美日韩久久久一区| 国产精品婷婷午夜在线观看| 日韩国产精品久久久| 成人小视频在线观看| 欧美电影免费观看高清完整版 | 男女男精品网站| 欧美精品自拍偷拍| 日韩在线播放一区二区| 91精品国产入口在线| 日韩精品电影在线观看| 欧美特级限制片免费在线观看| 国产视频一区二区在线观看| 亚洲精品久久7777| 麻豆91精品91久久久的内涵| 91黄视频在线观看| 国产精品三级视频| 成人黄色777网| 亚洲精品美腿丝袜| 欧美乱熟臀69xxxxxx| 日韩和欧美的一区| 日韩免费一区二区| 国产精品66部| 国产精品二区一区二区aⅴ污介绍| 国产乱码精品1区2区3区| 午夜精品久久久久久久久久| 欧美日韩一级二级三级| 久久国内精品自在自线400部| www国产亚洲精品久久麻豆| 国产凹凸在线观看一区二区| 一区二区三区四区高清精品免费观看 | 欧美一区二区观看视频| 国产91在线观看| 五月综合激情婷婷六月色窝| 久久久久久久久岛国免费| 一本色道久久加勒比精品| 秋霞电影网一区二区| 国产农村妇女毛片精品久久麻豆 | 久久se这里有精品| 一区二区成人在线| 久久久久久久电影| 欧美一区二区在线免费播放 | 成人av网址在线观看| 老司机精品视频在线| 午夜激情综合网| 亚洲天堂中文字幕| 中文字幕在线不卡| 精品久久久久一区二区国产| 欧美性生交片4| 色老汉av一区二区三区| 成人午夜电影久久影院| 国产一区二区三区在线观看精品| 亚洲第四色夜色| 一区二区三区欧美在线观看| 国产精品久久久久久福利一牛影视| 2020国产成人综合网| 欧美不卡123| 欧美精品一区二区三区视频 | 欧美丰满一区二区免费视频| 在线免费观看日韩欧美| 日本道色综合久久| 欧美视频中文一区二区三区在线观看| 亚洲欧美色综合| 欧美精品一区二区三区蜜桃视频 | 午夜电影久久久| 视频一区视频二区中文| 久久国产精品99久久人人澡| 久久福利视频一区二区| 国产大片一区二区| 91在线观看地址| 7777精品伊人久久久大香线蕉经典版下载| 欧美色视频一区| 欧美xxxx老人做受| 国产精品三级视频| 狠狠色2019综合网| 3d动漫精品啪啪1区2区免费| 中文字幕的久久| 蜜臀久久99精品久久久久宅男| 成人av影视在线观看| 精品国产乱码久久久久久图片| 玉足女爽爽91| 成人av免费在线播放| 国产日韩精品久久久| 国内精品不卡在线| 欧美韩国一区二区| 成人午夜碰碰视频| 99九九99九九九视频精品| 欧美一区二区三区四区在线观看| 亚洲精品亚洲人成人网在线播放| 一区二区三区欧美在线观看| 国产精品无遮挡| 日韩不卡免费视频| 久久综合久久鬼色中文字| 久久99久久久久| 99久久久久久99| 欧美一区二区三区日韩| 亚洲精品精品亚洲| 国产成人h网站| 欧美性极品少妇| 欧美成人官网二区| 久久亚洲精精品中文字幕早川悠里| 欧美极品另类videosde| 国产午夜精品一区二区三区嫩草| 午夜精品久久久久| 3d成人动漫网站| 一区精品在线播放| 91久久精品一区二区三区| 中文字幕一区二区三区蜜月| 久久精品国产77777蜜臀| 香蕉久久一区二区不卡无毒影院| 亚洲裸体在线观看| 国产精品一二三区| 中文字幕在线一区免费| 亚洲一区在线电影| 色婷婷av一区二区三区gif| 欧美精品v日韩精品v韩国精品v| 最新热久久免费视频| 欧美日韩国产成人在线免费| 国产精品资源网站| 久久国产三级精品| 亚洲成av人影院| 亚洲精品视频在线看| 精品国产乱码久久久久久图片| 免费高清在线一区| 夜夜精品视频一区二区 | 色天使色偷偷av一区二区| 精品入口麻豆88视频| 亚洲成人三级小说| 欧美精品xxxxbbbb| 国产激情视频一区二区三区欧美 | 一区二区高清免费观看影视大全| 欧美亚洲国产一区在线观看网站 | 欧美xxx久久| 日本人妖一区二区| 国产精品天美传媒沈樵| 久久综合av免费| 91精品国产91久久久久久最新毛片| av在线综合网| 91网站黄www| hitomi一区二区三区精品| 成人黄色777网| 国产精品一区二区视频| 国产在线乱码一区二区三区| 蜜臀久久久99精品久久久久久|